===============================================================================
Security Advisory CERT-NL
===============================================================================
Author/Source : CERT-NL Index : S-92-09
Distribution : SURFnet Constituency Page : 1
Classification: External Version: final
Subject : AIX Anon. FTP Vulnerability Date : 27-apr-92
===============================================================================
CERT-NL (SURFnet Computer Emergency Response Team) has received
information concerning a security problem in AIX Anon. FTP.
CERT-NL wishes to thank CERT/CC for bringing this to our attention.
===========================================================================
CA-92:09 CERT Advisory
April 27, 1992
AIX Anonymous FTP Vulnerability
---------------------------------------------------------------------------
The Computer Emergency Response Team/Coordination Center (CERT/CC) has
received information concerning a vulnerability in the anonymous FTP
configuration in all versions of AIX.
IBM is aware of this problem and a fix is available as apar number
"ix23944". This patch is available for all AIX releases from "GOLD".
IBM customers may call IBM Support (800-237-5511) and ask that the fix
be shipped to them. Patches may be obtained outside the U.S. by contacting
your local IBM representative. The fix will appear in the upcoming 2009
update and the next release of AIX.
---------------------------------------------------------------------------
I. Description
Previous versions of the anonymous FTP installation script,
/usr/lpp/tcpip/samples/anon.ftp, incorrectly configured various files
and directories.
II. Impact
Remote users can execute unauthorized commands and gain access to the
system if anonymous FTP has been installed.
III. Solution
A. Obtain the fix from IBM Support. The fix contains three
files: a "readme" file (README.a23944), the fix installation
script (install.a23944), and an archive containing the updated
files (PATCH.a23944.Z).
B. Install the fix following the instructions in the README file.
---------------------------------------------------------------------------
The CERT/CC would like to thank Charles McGuire of the Computer Science
Department, the University of Montana for bringing this security
vulnerability to our attention and IBM for their response to the problem.
---------------------------------------------------------------------------
==============================================================================
CERT-NL is the Computer Emergency Response Team, located in The
Netherlands. CERT-NL is a Full Member of the Forum of Incident Response
and Security Teams (FIRST). The constituency of CERT-NL are the SURFnet
connected institutions.
Past CERT-NL Security Bulletins and other CERT-NL related material can
be found on the anonymous FTP server of SURFnet bv:
"ftp.nic.surfnet.nl" [192.87.46.3], in the directory "netman/cert-nl".
This information is also available using email. Send an email saying
"help" to "mailserv@nic.surfnet.nl".
In case of computer or network security problems please contact CERT-NL
or the CERT of your own constituency. Please be aware of the fact that
we are are one hour ahead of Universal Time Coordinated (i.e. UTC+0100).
Email: cert-nl@surfnet.nl
Phone: +31 30 310290
Fax: +31 30 340903
Snailmail: SURFnet bv
Attn. CERT-NL
P.O. Box 19035
NL - 3501 DA UTRECHT
The Netherlands
A 7*24h phonenumber is available to SURFnet SSC's and FIRST members on request
==============================================================================